3dbewar / droidbox

Automatically exported from code.google.com/p/droidbox
0 stars 0 forks source link

some question with the output #22

Open GoogleCodeExporter opened 8 years ago

GoogleCodeExporter commented 8 years ago
What steps will reproduce the problem?
1.
2.
3.

What is the expected output? What do you see instead?

What version of the product are you using? On what operating system?

Please provide any additional information below.

After I run ./droidbox.sh xx.apk 
In the terminal, it is always shown
____                        __  ____
/\  _`\               __    /\ \/\  _`\
\ \ \/\ \  _ __  ___ /\_\   \_\ \ \ \L\ \   ___   __  _
 \ \ \ \ \/\`'__\ __`\/\ \  /'_` \ \  _ <' / __`\/\ \/'\
  \ \ \_\ \ \ \/\ \L\ \ \ \/\ \L\ \ \ \L\ \ \L\ \/>  </
   \ \____/\ \_\ \____/\ \_\ \___,_\ \____/ \____//\_/\_\
    \/___/  \/_/\/___/  \/_/\/__,_ /\/___/ \/___/ \//\/_/
^C   [*] Collected 0 sandbox logs                         

     [Info]
     ------
        File name:  DroidBoxTests.apk
        MD5:        aed29f7e1405ebfd4fdceb387a1b947d
        SHA1:       4899999a96d3139c494e73934d0038ad5620bc91
        SHA256:     6cb4b4428e987c7fdde1bc867c550363f30e0d6cab336af69e6b19bec2a58e78
        Duration:   240.553128004s

[File activities]
     -----------------

        [Read operations]
        -----------------

        [Write operations]
        ------------------

How can I get more information or logs .

Original issue reported on code.google.com by 675399...@qq.com on 27 Feb 2012 at 2:04

GoogleCodeExporter commented 8 years ago
Me too,how to get a comprehensive information of malware?

Original comment by vinceHK2...@gmail.com on 2 Mar 2012 at 2:32

GoogleCodeExporter commented 8 years ago
Are you always getting empty reports?

Original comment by lantz.pa...@gmail.com on 10 Mar 2012 at 3:16

GoogleCodeExporter commented 8 years ago
I also get this problem. But instead of it being completely blank, I only get 
something from the Broadcast receivers part of the output. My AVD target is the 
Android 2.1

Original comment by rjtolent...@gmail.com on 11 Mar 2012 at 3:10

GoogleCodeExporter commented 8 years ago
Same problem. With some apks I get Broadcast receivers output where as for 
others, I get none.

Original comment by r3ha...@gmail.com on 12 Mar 2012 at 6:37

GoogleCodeExporter commented 8 years ago
Nevermind, I got it to work. I kept getting the error "ADB server didn't ACK
* failed to start daemon *" Fixed that and it worked.

Original comment by r3ha...@gmail.com on 12 Mar 2012 at 7:01

GoogleCodeExporter commented 8 years ago
[deleted comment]
GoogleCodeExporter commented 8 years ago
The reasons: the apk have installed in android,but the malware be not touch 
off.i use the monkey to touch off a malware,and monkey was be killed. why is it 
i donot know? 

Original comment by zifang...@gmail.com on 2 Jul 2012 at 3:47

GoogleCodeExporter commented 8 years ago
Hey, I got the same problem,
All APK test has none logs include the DroidboxTests.apk,
 ____                        __  ____
/\  _`\               __    /\ \/\  _`\
\ \ \/\ \  _ __  ___ /\_\   \_\ \ \ \L\ \   ___   __  _
 \ \ \ \ \/\`'__\ __`\/\ \  /'_` \ \  _ <' / __`\/\ \/'\
  \ \ \_\ \ \ \/\ \L\ \ \ \/\ \L\ \ \ \L\ \ \L\ \/>  </
   \ \____/\ \_\ \____/\ \_\ \___,_\ \____/ \____//\_/\_\
    \/___/  \/_/\/___/  \/_/\/__,_ /\/___/ \/___/ \//\/_/
^C   [*] Collected 0 sandbox logs                     

And the sandbox logs is still 0 whenever run any times.After Actrl+C,there was 
nothing I got ,and the png pictures was empty,too.
Can anyone help me?Thanks for advance.

Original comment by zhuobat...@gmail.com on 12 Sep 2013 at 3:41

GoogleCodeExporter commented 8 years ago
[deleted comment]
GoogleCodeExporter commented 8 years ago
I am getting the o/p some thing like this

I am expecting structured output like what this video shows
https://www.youtube.com/watch?v=E-3s7ZfjTsA&noredirect=1

also the png image was not saved. Please let me know if any package needs to
installed for getting it work?

Pasting the output for the reference.

33a204672692c203031204a616e2031393930203030", "host": "173.194.126.69", "type": 
"net read", "port": "80"}, "1.8875269889831543": {"data": 
"6f2d63616368652c206d7573742d726576616c69646174650d0a436f6e74656e742d547970653a2
0746578742f68746d6c3b20636861727365743d5554462d380d0a582d436f6e74656e742d5479706
52d4f7074696f6e733a206e6f736e6966660d0a53", "host": "173.194.126.69", "type": 
"net read", "port": "80"}, "1.9445819854736328": {"data": 
"272f2f64726f6964626f782e676f6f676c65636f64652e636f6d2f66696c65732f64726f6964626
f78342e312e312e7461722e677a272c202746656174757265642c20547970652d536f75726365275
d293b223e0a203c2f613e0a203c6120687265663d", "host": "173.194.126.69", "type": 
"net read", "port": "80"}, "2.918276071548462": {"data": 
"485454502f312e3020353033205365727669636520556e617661696c61626c650d0a53657276657
23a2073717569642f332e312e31300d0a4d696d652d56657273696f6e3a20312e300d0a446174653
a205475652c203139204175672032303134203130", "host": "74.207.224.32", "type": 
"net read", "port": "80"}, "1.9314539432525635": {"data": 
"6e74656e743d22746578742f68746d6c3b20636861727365743d5554462d3822203e0a203c6d657
46120687474702d65717569763d22582d55412d436f6d70617469626c652220636f6e74656e743d2
249453d656467652c6368726f6d653d3122203e0a", "host": "173.194.126.69", "type": 
"net read", "port": "80"}, "1.9145550727844238": {"data": 
"0d0a582d43616368652d4c6f6f6b75703a204d4953532066726f6d2070726f78793a383038300d0
a436f6e6e656374696f6e3a20636c6f73650d0a0d0a0a0a3c21444f43545950452068746d6c3e0a3
c68746d6c3e0a3c686561643e0a203c6d65746120", "host": "173.194.126.69", "type": 
"net read", "port": "80"}, "2.928925037384033": {"data": 
"38300d0a436f6e6e656374696f6e3a206b6565702d616c6976650d0a0d0a3c21444f43545950452
068746d6c205055424c494320222d2f2f5733432f2f4454442048544d4c20342e30312f2f454e222
022687474703a2f2f7777772e77332e6f72672f54", "host": "74.207.224.32", "type": 
"net read", "port": "80"}, "1.8931450843811035": {"data": 
"376238663633323a544d3d313430383434323834323a4c4d3d313430383434323834323a533d447
475566a4151664d7a7138626453633b20657870697265733d5468752c2031382d4175672d3230313
62031303a30373a323220474d543b20706174683d", "host": "173.194.126.69", "type": 
"net read", "port": "80"}, "2.9230141639709473": {"data": 
"78742f68746d6c0d0a436f6e74656e742d4c656e6774683a20333339370d0a582d53717569642d4
572726f723a204552525f434f4e4e4543545f4641494c203131310d0a582d43616368653a204d495
3532066726f6d2070726f78790d0a582d43616368", "host": "74.207.224.32", "type": 
"net read", "port": "80"}, "1.8984301090240479": {"data": 
"723a20636f6465736974650d0a582d5853532d50726f74656374696f6e3a20313b206d6f64653d6
26c6f636b0d0a582d4672616d652d4f7074696f6e733a2053414d454f524947494e0d0a416c74657
26e6174652d50726f746f636f6c3a2038303a7175", "host": "173.194.126.69", "type": 
"net read", "port": "80"}}, "servicestart": {"6.461895942687988": {"type": 
"service", "name": "com.android.contacts.ViewNotificationService"}, 
"18.36899995803833": {"type": "service", "name": 
"com.android.contacts.calllog.CallLogNotificationsService"}}, "sendsms": 
{"2.987370014190674": {"message": "Sending sms...", "type": "sms", "number": 
"0735445281"}, "3.0141539573669434": {"message": 
"92a871af351ba74720dd7ab4d9126996", "tag": ["TAINT_IMEI"], "type": "sms", 
"sink": "SMS", "number": "0735445281"}}, "cryptousage": {"1.5051469802856445": 
{"operation": "keyalgo", "type": "crypto", "algorithm": "AES", "key": "0, 42, 
2, 54, 4, 45, 6, 7, 65, 9, 54, 11, 12, 13, 60, 15"}, "1.5088069438934326": 
{"type": "crypto", "operation": "encryption", "data": "357242043237511", 
"algorithm": "AES"}, "1.5226011276245117": {"operation": "keyalgo", "type": 
"crypto", "algorithm": "DES", "key": "0, 42, 2, 54, 4, 45, 6, 8"}, 
"1.5254271030426025": {"type": "crypto", "operation": "encryption", "data": 
"357242043237511", "algorithm": "DES"}, "1.530076026916504": {"operation": 
"keyalgo", "type": "crypto", "algorithm": "DES", "key": "0, 42, 2, 54, 4, 45, 
6, 8"}, "1.5318090915679932": {"type": "crypto", "operation": "decryption", 
"data": "357242043237511", "algorithm": "DES"}, "1.5124361515045166": 
{"operation": "keyalgo", "type": "crypto", "algorithm": "AES", "key": "0, 42, 
2, 54, 4, 45, 6, 7, 65, 9, 54, 11, 12, 13, 60, 15"}, "1.5138540267944336": 
{"type": "crypto", "operation": "decryption", "data": "357242043237511", 
"algorithm": "AES"}}, "sendnet": {"1.5918750762939453": {"type": "net write", 
"desthost": "173.194.126.69", "fd": "20", "operation": "send", "data": 
"474554202f702f64726f6964626f782f20485454502f312e310d0a557365722d4167656e743a204
4616c76696b2f312e362e3020284c696e75783b20553b20416e64726f696420342e312e313b20467
56c6c20416e64726f6964206f6e20456d756c6174", "destport": "80"}, 
"1.9775769710540771": {"type": "net write", "desthost": "74.207.224.32", "tag": 
["TAINT_IMEI"], "fd": "23", "sink": "Network", "operation": "send", "data": 
"474554202f696d65692e7068703f696d65693d37666137353730356437353433376236646630373
96263366565313731396461353733663837643520485454502f312e310d0a557365722d4167656e7
43a2044616c76696b2f312e362e3020284c696e75", "destport": "80"}}, 
"accessedfiles": {"1679427065": "/proc/2020/cmdline", "791495430": 
"/data/data/droidbox.tests/files/output.txt", "1792798780": 
"/data/data/droidbox.tests/files/myfilename.txt", "1515390314": 
"/data/data/droidbox.tests/files/output.txt", "1969315119": 
"/data/data/com.GoldDream.TingTing08ii/files/zjphonecall.txt", "833380305": 
"/data/data/droidbox.tests/files/output.txt", "103176886": 
"/proc/2031/cmdline", "40458650": 
"/data/data/droidbox.tests/files/myfilename.txt", "262021480": 
"/data/data/droidbox.tests/files/myfilename.txt"}, "fdaccess": 
{"1.436953067779541": {"path": 
"/data/data/droidbox.tests/files/myfilename.txt", "operation": "write", "data": 
"57726974652061206c696e650a", "id": "1792798780", "type": "file write"}, 
"1.441241979598999": {"path": "/data/data/droidbox.tests/files/output.txt", 
"operation": "write", "data": "6e756c6c0a", "id": "833380305", "type": "file 
write"}, "1.4866361618041992": {"path": 
"/data/data/droidbox.tests/files/output.txt", "operation": "read", "data": 
"0000000000000000000000000000000000000000000000000000000000000000000000000000000
00000000000000000000000000000000000000000000000000000000000000000000000000000000
00000000000000000000000000000000000000000", "id": "1515390314", "type": "file 
read"}, "1.4634780883789062": {"path": 
"/data/data/droidbox.tests/files/myfilename.txt", "operation": "read", "data": 
"0000000000000000000000000000000000000000000000000000000000000000000000000000000
00000000000000000000000000000000000000000000000000000000000000000000000000000000
00000000000000000000000000000000000000000", "id": "262021480", "type": "file 
read"},

Original comment by vijayend...@gmail.com on 19 Aug 2014 at 10:19